(e-book) Poradniki informatyczne

al

Marszałek Forum
Członek Załogi
Administrator
Dołączył
22 Lipiec 2012
Posty
9959
Reakcje/Polubienia
10582
Miasto
Somewhere over the rainbow.
longinus napisał:
130 FREE Microsoft eBooks
Largest collection of FREE Microsoft eBooks ever, including: Windows 8.1, Windows 8, Windows 7, Office 2013, Office 365, Office 2010, SharePoint 2013, Dynamics CRM, PowerShell, Exchange Server, Lync 2013, System Center, Azure, Cloud, SQL Server, and much more

Zaloguj lub Zarejestruj się aby zobaczyć!

Już to wrzuciłem:

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Ebooki związane z szeroko rozumianą kryptografią:

Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanston - „Handbook of Applied Cryptography (Discrete Mathematics and Its Applications)” - język angielski, s. 794, pdf, ps.

Zt5aNEe.jpg


This book is an incredible achievement. The handbook is complete. If you want to check what problems there were with a proposed system, determine how the variations on a particular algorithm developed, see what research preceded and followed an idea, go to the Handbook.

The Handbook has accurate, clear, and correct information. It is wonderful. If I were limited to only one cryptography text on my shelves, it would be the Handbook of Applied Cryptography.

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail.

This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional.

Zaloguj lub Zarejestruj się aby zobaczyć!

Zaloguj lub Zarejestruj się aby zobaczyć!

Dorothy Elizabeth Robling Denning - „Cryptography and Data Security” - język angielski, s. 419, pdf.

AOtBgUc.jpg


The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles.

Zaloguj lub Zarejestruj się aby zobaczyć!

Keijo Ruohonen - „Mathematical Cryptology” - język angielski, s. 138, pdf.

53DlNzl.jpg


These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced together with its backgrounds.

Zaloguj lub Zarejestruj się aby zobaczyć!

Christophe Ritzenthaler - „Cryptology Course” - język angielski, s. 124, pdf.

These are notes of a course taught at Marseille in Second Semester 2006.

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Peter Harrison - „Linux Quick Fix Notebook” - język angielski, pdf, s. 690.

lkumjuw.jpg


An indispensable ebook for every Linux administrator! Instant access to precise, step-by-step solutions for every essential Linux administration task from basic configuration and troubleshooting to advanced security and optimization.

If you’re responsible for delivering results with Linux, Linux® Quick Fix Notebook brings together all the step-by-step instructions, precise configuration commands, and real-world guidance you need. This distilled, focused, task-centered guide was written for sysadmins, netadmins, consultants, power users…everyone whose livelihood depends on making Linux work, and keeping it working.

This book’s handy Q&A format gives you instant access to specific answers, without ever forcing you to wade through theory or jargon. Peter Harrison addresses virtually every aspect of Linux administration, from software installation to security, user management to Internet services–even advanced topics such as software RAID and centralized LDAP authentication. Harrison’s proven command-line examples work quickly and efficiently, no matter what Linux distribution you’re using.

Źródło: amazon.com

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Bakari Chavanu - „The Awesome Automation Guide for Macs” - język angielski, pdf, s. 73.

c4BAEOZ.jpg


Work smart, not hard. That’s the idea behind Mac Automation, a technology built into Apple’s OS X but frequently underutilized. Whether it’s sorting your email, searching your documents or building a playlist, you’d be amazed how many tasks can be done automatically instead of manually – if only you knew how to get started.

It explains everything you need to stop clicking your mouse so often and start letting your computer do the boring stuff for you. Take full advantage of the most powerful operating system on the planet and save yourself from time.

Źródło: makeuseof.com

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Machtelt Garrels - „Introduction to Linux. A Hands on Guide”- język angielski, pdf, s. 223.

0Ta8xGU.jpg


Many people still believe that learning Linux is difficult, or that only experts can understand how a Linux system works. Though there is a lot of free documentation available, the documentation is widely scattered on the Web, and often confusing, since it is usually oriented toward experienced UNIX or Linux users. Today, thanks to the advancements in development, Linux has grown in popularity both at home and at work. The goal of this guide is to show people of all ages that Linux can be simple and fun, and used for all kinds of purposes.

Źródło: freetechbooks.com

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Paul Cobbaut - „Linux Fundamentals” - język angielski, pdf, s. 302.

gsvzIOs.jpg


This book is meant to be used in an instructor-led training. For self-study, the intent is to read this book next to a working Linux computer so you can immediately do every subject, practicing each command.

This book is aimed at novice Linux system administrators (and might be interesting and useful for home users that want to know a bit more about their Linux system). However, this book is not meant as an introduction to Linux desktop applications like text editors, browsers, mail clients, multimedia or office applications.

Źródło: ebookjunkie.com

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Maximize Your Memory

pknAndq.gif


Maximize Your Memory teaches you how to read faster and retain more, never forget names or number, and improve your score on tests. Each of us has the ability to develop and improve our minds in amazing ways. All you need is motivation, an effective method, and an expert guide like Maximize Your Memory.

Maximize Your Memory is for people who want to reach their best potential, as well as anyone else who dreams of increasing his or her mental capacity. As the author himself declares, “It is possible to learn the things I can do. And everyone can learn. I am the world champion in speed memory, but my wife is second and my brother is eighth. After one hour of training with my methods, my students can triple their reading speed.”

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Web Penetration Testing
Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit. Web Penetration Testing with Kali Linux is what you need to be fully up-to-speed with this powerful open-source toolkit — and you’re getting 3 additional security resources to increase your knowledge as well

Zaloguj lub Zarejestruj się aby zobaczyć!
 
A

Anonymous

Top Trending IT Security Resources
Download Top Trending IT Security Resources to learn everything you need to know about IT Security. Top Trending IT Security Resources brings together the latest in information, coverage of important developments, and expert commentary to help with your IT security related decisions

Zaloguj lub Zarejestruj się aby zobaczyć!
 
Do góry